Computer science shirts and computer science articles
Home is still the best place to be. Who likes to sit at other people's computers where nothing is set up the way it should be ;)
We all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsThe (almost exclusively jokingly used) eighth layer of the OSI model for network protocols is a nice way of saying that the problem lies with the p...
View full detailsThis nerdy Cooling Please Wait Trivet ensures that all sensitive surfaces in your household are spared from hot pots, casseroles and pans. There's ...
View full detailsIn 1989, Phil Katz thought that you could really make money with compression. He was not entirely wrong, because the invention of the ZIP format ma...
View full detailsWhat the gun is for the assassin, the mouse is for the gamer. Of course, everyone has their own preferences when it comes to different designs and ...
View full detailsWhen programmers have worked too long on a project, or when you ask them how the code they worked on actually functions, their favorite answer will...
View full detailsAnyone who's ever developed a program knows that just because it works on one person's computer, doesn't means it works on another! Given the almos...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
The word hacker in Japanese on a shirt. The characters are pronounced "hakka" (with a small pause between the k, i.e. "hak (pause) ka").
As a nerd, one needs to be careful. One small mishap, one mistake and the whole disguise of a friendly and harmless computer guy can come crumbling...
View full detailsA progress bar for human thinking processes could be pretty useful, don't you think? Everyone would know whether there's enough time to go get a cu...
View full detailsWhy don't we use the binary system in elementary school? Learning just two numbers would make a lot of things easier and it would also be easier to...
View full detailsLook again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
Most of us nerds have a naturally vivid imagination. This is especially true for the Dungeon Masters among us. Even during the grey of everyday lif...
View full detailsIn the bible, the Four Horsemen are the personifications of war, hunger, pestilence and death. But even those who don’t believe in the Christian ve...
View full details"Too many cooks spoil the broth!" - a principle that not only applies in the kitchen but also the world of IT. When it comes to identifying former ...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsHow can I do X? And how does Y work? Can I do Z instead? Almost 99 percent of all questions that admins, helpdesks and other service agents get tor...
View full detailsIt's safe to say that without IT specialists, the world as we know it could hardly function. Most aspects of our lives, whether we realize it or no...
View full detailsThis board game is probably not the number one choice for adult programmers of this world, but it is something the children might get a lot out of....
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsAll users of a unix-like operating systems (Linux, Mac, BSD, etc) should know what a fork bomb is. A fork bomb is a program which creates so many c...
View full detailsLinux - The choice of the GNU generation
"Hey, you're working with computers, right? Can you take a look at my laptop? Internet Explorer is extremely slow and this moose keeps asking for m...
View full detailsSometimes you just need a little longer to sort out your thoughts. Just point to the button and finish thinking. That way everyone knows and you ha...
View full detailsMechanical keyboards are usually a double-edged sword for Mac users, as they often only have the labelling for the PC. Not so The MacTigr keyboard,...
View full detailsWhen it comes to finding a keyboard that excels at typing, coding, gaming and all other tasks, one quickly arrives at mechanical keyboards. To be m...
View full detailsAt times, we reach the point where our brain just refuses to function properly and even the simplest tasks are impossible to complete. Most program...
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsWe really don't know what evolution was thinking with zebras! Ok, maybe the stripes help against flies, in the heat or confuse predators. But let's...
View full detailsThe back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.
To be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsIf only the world was more like a computer, we’d at least know what to expect, how things behave and where things would belong. Well, most of the t...
View full detailsWhen it's done, it's done and everything will run the way you expect it to run. Well, in theory...In a couple of months, you might have to make som...
View full details